PRACTICAL NETWORK DEFENSE VERSION 1

Size: px
Start display at page:

Download "PRACTICAL NETWORK DEFENSE VERSION 1"

Transcription

1 PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations such as:

2 INTRODUCTION COURSE GOALS Practical Network Defense is a practical self-study course which covers network and system security topics. The lessons include full practical setup guides, as well as virtual labs in Hera for the student to practice their new skills before deploying these technologies and strategies in a production network. The course starts with an introductory section which covers security basics, the terms you need to know and a brief primer on TCP/IP. The primary sections of the course are divided up into network security and endpoint security. Network security will teach you secure network design concepts, configuration of network appliances such as switches, and a look into the secure configuration of firewalls, web filtering and advanced malware protection. The endpoint security section focuses mainly on Windows security, as most corporate networks have a majority of Windows systems. You will also learn Active Directory, Group Policy, patch management, endpoint hardening and the vulnerability management cycle. These topics are taught in a practical manner with step-by-step guides on deploying the actual technology in use. You will leave this class knowing exactly how to accomplish these tasks. The course also prepares you for the elearnsecurity Network Defense Professional certification exam. PRE-REQUISITES This course explains many of the fundamental topics of information security: however, knowledge and experience of information technology skills prior to the class will be very beneficial for your learning. You should have a(n): Basic understanding of networking: TCP/IP, Routing Basic understanding of IT Security subjects Intermediate understanding of the Windows operating system WHO SHOULD TAKE THIS COURSE The PND training course is primarily geared towards Network/System administrators who manage an internal network and would like to protect their network from attacks or malware. Penetration testers and security assessors will

3 INTRODUCTION also greatly benefit from this course as they will learn how to practically remediate many of the issues they discover and can provide a new value-added service. Additionally, penetration testers will also learn more about how different networks are defended and gain a better understanding of how to penetrate them. Penetration testers System Administrators IT Security Professionals Network Administrators IT Personnel HOW AM I GOING TO LEARN THIS? elearnsecurity courses are very interactive, addictive, and presents content in such a way that it appeals to all learning styles. During this training course, you will have several guided labs. That will provide you with relevant and hands-on practical application experience. Do not expect the outdated way of learning, merely reading pages of theoretical methodologies. IS THERE A FINAL EXAMINATION? Yes. The final examination consists of two parts. The first part is a multiple-choice test. Once you have passed this, you will proceed to the hands-on examination. During the second part of your exam, you will have to remediate security issues and harden a virtual network against attacks. WILL I GET A CERTIFICATE? The PND course leads to the endp certification. Once you have passed both parts of the final examination, you will be an elearnsecurity Network Defense Professional and will granted the endp certification. You can print your shiny new certificate or have it shipped to you internationally.

4 INTRODUCTION ORGANIZATION OF CONTENTS INTRODUCTION The introductory section will provide you with the background knowledge you need to succeed in information security. These topics will add to and reinforce what you already know, and help to ensure that you have a more secure understanding of the topics in other modules. Module 1: Introduction Module 2: TCP Module 3: Attacks NETWORK SECURITY The network security section covers many aspects of securing the network through network design, several network appliances and properly hardening those appliances. Module 1: Perimeter Appliances Module 2: Secure Network Design Part I Module 3: Firewall Configuration Part I Module 4: Firewall Configuration Part II Module 5: Secure Network Design Part II Module 6: VPN Module 7: Switch Configuration ENDPOINT SECURITY In addition to network security, securing the endpoints is equally as important. This section will cover everything you need to get started in hardening your Windows environment. When it comes to securing your network, the approach is no longer planning for if an attacker gets into your network but when. Endpoint security is just as important as network security when it comes to reducing the attack surface and preventing lateral movement. Module 1: System Security Module 2: Active Directory Module 3: WSUS

5 INTRODUCTION Module 4: Microsoft EMET Module 5: Group Policy Revisited Module 6: Endpoint Security Module 7: Printers Module 8: Vulnerabilities Module 9: Controlling Vendor Access

6 INTRO TO NETWORK DEFENSE MODULE 1: INTRODUCTION In this module, you will learn the basics of information security, including the why, as well as the associated vocabulary. The terms will not only be referenced a lot in the course but will be used quite a bit throughout your information security career. 1. Introduction 1.1. Opening Statements 1.2. Security Background 1.3. Terms MODULE 2: TCP How TCP works is a very important concept to understand. This module covers the OSI/TCP models, the connections themselves and how you can explore live connections yourself with Wireshark. Being able to understand and recognize different TCP connections helps you to identify potentially malicious traffic and understand network-related logs. 2. TCP 2.1. OSI Model 2.2. TCP Model 2.3. TCP Flags 2.4. TCP Connections 2.5. Wireshark MODULE 3: ATTACKS As Sun Tzu said, know your enemy. This module explains some of the attack vectors you will be dealing with when it comes to defending your network. This module concludes with a full scenario of a company s network being compromised. 3. Attacks 3.1. Brute Force 3.2. Exploits 3.3. Denial of Service 3.4. Web Attacks 3.5. Client-Side Attacks 3.6. Full Attack Example

7 NETWORK SECURITY MODULE 1: PERIMETER APPLIANCES In this module, you will learn the majority of the network security appliances in use today. Although new appliances do not necessarily mean better security, knowing what is available and their purpose can aid in a secure network design. 1. Perimeter Appliances 1.1. Web filters 1.2. Intrusion Prevention Systems 1.3. Advanced Malware Protection 1.4. Firewalls 1.5. Virtual Private Networks MODULE 2: SECURE NETWORK DESIGN PART I One of the most important fundamental topics when it comes to securing a network is the design and topology of the network. This module will teach you the considerations and strategies used when planning for a secure network. Here we introduce more of the theory side before diving into the next practical modules to ensure you have a solid understanding of what we are trying to accomplish. 2. Secure Network Design Part I 2.1. Topology 2.2. DMZ 2.3. Network Address Translation 2.4. Access Control List MODULE 3: FIREWALL CONFIGURATION PART I When it comes to the perimeter or network segmentation, the firewall is an integral piece of technology. In this module, you will look at configuring a firewall appliance from start to finish, with focus on the ACL. This module also covers some of the Next Generation Firewall features such as application identification, IPS and web filtering. Although we focus on the configuration of two specific firewalls, our goal is to teach you the methodologies to configuring them as a whole so you can apply them to ANY firewall you come across.

8 NETWORK SECURITY 3. Firewall configuration Part I 3.1. Device Configuration 3.2. Objects 3.3. Network Setup 3.4. NAT 3.5. ACL 3.6. FTP Example MODULE 4: FIREWALL CONFIGURATION PART II Some of today s firewalls and other network security appliances include advanced features, which allow you to secure your network even more. This module will show you some of these features to help you control, identify and prevent threats. 4. Firewall configuration Part II 4.1. Advanced Malware Protection 4.2. User Identification 4.3. SSL Inspection and Decryption MODULE 5: SECURE NETWORK DESIGN PART II The first module introduced secure network design, which we will expand upon in this module. You will learn more about network segmentation at both the layer 3 and layer 2 levels. We will also brief you on some of the planning topics you will encounter when planning secure design. 5. Secure network design Part II 5.1. Network Zones 5.2. Secure Network Planning 5.3. Segmentation 5.4. Secure Switching 5.5. Securing the Device MODULE 6: VPN Providing secure remote access is becoming a very common requirement these days, whether it is a site to site tunnel or remote access for your mobile workforce. This module will teach you what you need to know about both, as well as walk you through

9 NETWORK SECURITY practical examples of deploying them. It also covers both IPSEC site to site VPN, as well as remote client-access VPN using desktop VPN software. 6. VPN 6.1. The connection 6.2. Site to site tunnels 6.3. Remote Access VPN 6.4. OpenVPN Remote Access VPN MODULE 7: SWITCH CONFIGURATION Switches are often overlooked in the security plan but can provide additional security at layer two. This module will look at setting up a switch, hardening the device itself and setting up many layer 2 security layers. As with the firewall module, we will focus on the configuration of one switch, but aim to teach you to apply the same methodologies to any switch you encounter. 7. Switch configuration 7.1. Initial Configuration 7.2. DHCP-Snooping 7.3. Port Security 7.4. Dynamic ARP Inspection 7.5. Segmentation 7.6. Access Control Lists

10 ENDPOINT SECURITY MODULE 1: SYSTEM SECURITY This module introduces some of the core topics on system security. It covers the basics of the technologies and strategies involved in every endpoint protection plan. 1. System Security 1.1. Antivirus 1.2. Endpoint Encryption 1.3. Buffer Overflows 1.4. Mitigations 1.5. Virtualization 1.6. Log Review MODULE 2: ACTIVE DIRECTORY The foundation for any Windows network is Active Directory. It takes care of your access control, manages users and groups, and sets policies to control and harden your Windows domain-joined computers/servers via Group Policy. Finally, we will cover Active Directory Certificate Services and how to set it up correctly so you can implement a PKI. 2. Active Directory 2.1. Active Directory Basics 2.2. Active Directory Integrated DNS 2.3. Group Policy 2.4. Group Policy Permissions 2.5. Active Directory Certificate Services MODULE 3: WSUS As you will learn in this course and may already know, patch management is essential to keeping your systems safe. This module will teach you how to setup and manage Windows Server Update Services so you can control and monitor the Windows patch levels in your environment. We will also introduce Windows Package Publisher, which is a free third-party tool which allows you to deploy third party updates via WSUS.

11 ENDPOINT SECURITY 3. WSUS 3.1. Install WSUS 3.2. Setting up WSUS 3.3. WSUS Group Policy 3.4. WSUS Upkeep 3.5. Extending WSUS MODULE 4: MICROSOFT EMET Vulnerabilities and exploits are growing exponentially. Signature-based IDS/IPS is the most efficient method to prevent attacks: in this module, you will learn about Microsoft EMET which makes a successful exploit much more expensive for the attacker. This program also helps to keep your network safer in the zero-day window when no patch is available for a given program or operating system. 4. Microsoft EMET 4.1. Install WSUS 4.2. Setting up WSUS 4.3. WSUS Group Policy 4.4. WSUS Upkeep 4.5. Extending WSUS MODULE 5: GROUP POLICY REVISITED The first Active Directory module provided an introduction to Group Policy. In this module, we will take a look at several more Group Policy examples to show you different ways you can secure your Windows endpoints. 5. Group Policy Revisited 5.1. Password Policies 5.2. User Control 5.3. Restricting Null Sessions 5.4. Remote Desktop 5.5. Controlling Removable Media

12 ENDPOINT SECURITY MODULE 6: ENDPOINT SECURITY The first module introduced many of the endpoint security topics. This module will take a deeper dive into endpoint security and some of the specific things you should consider in your strategy. You will also see a couple of attacks and the practical mitigation steps to prevent them. 6. Endpoint Security 6.1. Common Pitfalls 6.2. Third Party Programs 6.3. User Access Control 6.4. Mitigate Pass the Hash 6.5. Advanced Security Products 6.6. Practical Malware Defense MODULE 7: PRINTERS Printers are usually overlooked yet sensitive information is usually sent to the printer via print or fax capabilities. In addition, many of today s printers run on a Linux kernel and are sometimes used as pivot points in attacks. This module will teach you the settings you need to configure to harden every printer on your network. 7. Printers 7.1. Hardening HP Printers 7.2. Hardening Xerox Printers MODULE 8: VULNERABILITIES An important part of any security program is vulnerability management. This module will teach you the steps of a vulnerability management program including port scans, vulnerability scans, reporting and remediation. 8. Vulnerabilities 8.1. Introduction 8.2. Port scanning

13 ENDPOINT SECURITY 8.3. Nessus Setting up Nessus Running First Scan Reviewing the Report 8.4. Qualys Setting up Qualys Network Map Vulnerability Scan MODULE 9: CONTROLLING VENDOR ACCESS Understanding the need to give your vendors secure access to your network while protecting your network from their connection is crucial; many of the attacks over the past few years have stemmed from vendors being compromised and the attackers using the vendor s remote access to pivot deeper into their target s network. This module will look at some important factors to consider regarding vendor management and how to secure you against unwanted activity. 9. Controlling Vendor Access 9.1. Active Directory 9.2. Network 9.3. Group Policy Example

14 We are elearnsecurity. Based in Santa Clara, California, with offices in Pisa, Italy, and Dubai, UAE, Caendra Inc. is a trusted source of IT security skills for IT professionals and corporations of all sizes. Caendra Inc. is the Silicon Valley-based company behind the elearnsecurity brand. elearnsecurity has proven to be a leading innovator in the field of practical security training, with best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework and Hera Network Security Lab, which has changed the way students learn and practice new skills. Contact details: contactus@elearnsecurity.com

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs

More information

INCIDENT HANDLING & RESPONSE PROFESSIONAL VERSION 1

INCIDENT HANDLING & RESPONSE PROFESSIONAL VERSION 1 INCIDENT HANDLING & RESPONSE PROFESSIONAL VERSION 1 The most practical and comprehensive training course on incident handling & response elearnsecurity has been chosen by students in over 140 countries

More information

Practical Network Defense Labs

Practical Network Defense Labs Practical Network Defense Labs ABOUT This document showcases my practical hands-on engagements in the elearnsecurity HERA labs environment for the Network Defense Professional certification course. I utilized

More information

PRACTICAL WEB DEFENSE VERSION 1

PRACTICAL WEB DEFENSE VERSION 1 PRACTICAL WEB DEFENSE VERSION 1 The most practical and comprehensive training course on web application defense elearnsecurity has been chosen by students in over 140 countries in the world and by leading

More information

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide. Course Outline CCNA Security 210-260 Official Cert 23 Apr 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Course D:Implementing and Managing Windows 100

Course D:Implementing and Managing Windows 100 Course 20697-1D:Implementing and Managing Windows 100 About this course: This course provides students with the knowledge and skills required to install and configure Windows 10 desktops and devices in

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar Course Outline CompTIA Network+ N10-007 (Course & Labs) 14 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs.  CompTIA Network+ N Pearson ucertify Course and Labs Course Outline CompTIA Network+ N10-007 Pearson ucertify Course 06 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

Microsoft Securing Windows Server 2016

Microsoft Securing Windows Server 2016 1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20744 - Securing Windows Server 2016 Price $4290.00 (inc GST) Version B Overview This five-day, instructor-led course teaches IT professionals

More information

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

IT Foundations Networking Specialist Certification with Exam

IT Foundations Networking Specialist Certification with Exam IT Foundations Networking Specialist Certification with Exam MSIT113 / 200 Hours / 12 Months / Self-Paced / Materials Included Course Overview: Gain hands-on expertise in CompTIA A+ certification exam

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

[MS20744]: Securing Windows Server 2016

[MS20744]: Securing Windows Server 2016 [MS20744]: Securing Windows Server 2016 Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Windows Server Delivery Method : Instructor-led (Classroom) Course Overview This five-day,

More information

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1.

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1. HP ProCurve Threat Management Services zl Module NPI Technical Training NPI Technical Training Version: 1.00 5 January 2009 2009 Hewlett-Packard Development Company, L.P. The information contained herein

More information

CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ]

CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ] s@lm@n CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ] Topic break down Topic No. of Questions Topic 1: Volume A 117 Topic 2: Volume B 122 Topic

More information

Course Outline. Course Outline :: 20744A::

Course Outline. Course Outline :: 20744A:: Module Title : 20744A: Securing Windows Server 2016 Duration : 5 days Overview This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Understanding Cisco Cybersecurity Fundamentals

Understanding Cisco Cybersecurity Fundamentals 210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

Informal Write-up on CCNA Security. October, 2009 (V1.0)

Informal Write-up on CCNA Security. October, 2009 (V1.0) Informal Write-up on CCNA Security October, 2009 (V1.0) Methodology: This document uses the Cisco Press CCNA Security Official Exam Certification Guide (otherwise referred to as the Security ECG in this

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab)  15 Jul 2018 Course Outline Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

CompTIA Network+ N ucertify Labs. Course Outline. CompTIA Network+ N ucertify Labs. 10 Oct

CompTIA Network+ N ucertify Labs. Course Outline. CompTIA Network+ N ucertify Labs. 10 Oct Course Outline CompTIA Network+ N10-007 ucertify Labs 10 Oct 2018 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the Art Educator

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

Course Outline. Implementing and Managing Windows 10 Course C: 5 days Instructor Led

Course Outline. Implementing and Managing Windows 10 Course C: 5 days Instructor Led Implementing and Managing Windows 10 Course 20697-1C: 5 days Instructor Led About this course This course is designed to provide students with the knowledge and skills required to install and configure

More information

Securing Windows Server 2016

Securing Windows Server 2016 Course 20744: Securing Windows Server 2016 Page 1 of 7 Securing Windows Server 2016 Course 20744: 4 days; Instructor-Led Introduction This four-day, instructor-led course teaches IT professionals how they

More information

Securing Windows Server 2016 (20744)

Securing Windows Server 2016 (20744) Securing Windows Server 2016 (20744) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Securing Windows Server Protecting credentials and implement privileged access

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Installing and Configuring Windows 10 5 Days, Instructor-led

Installing and Configuring Windows 10 5 Days, Instructor-led Installing and Configuring Windows 10 5 Days, Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

20744: Securing Windows Server Sobre o curso. Microsoft. Nível: Avançado Duração: 35h

20744: Securing Windows Server Sobre o curso. Microsoft. Nível: Avançado Duração: 35h 20744: Securing Windows Server 2016 Microsoft Nível: Avançado Duração: 35h Sobre o curso This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure

More information

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training Instructor-led Training Comprehensive Services from Your Trusted Security Partner Additional Information Recommended prerequisite for the Certified SonicWALL Security Administrator (CSSA) exam Course Description:

More information

Schedule of Maine is IT Offerings: 01/20/ /16/2015 Three Core IT Offerings:

Schedule of Maine is IT Offerings: 01/20/ /16/2015 Three Core IT Offerings: Schedule of Maine is IT Offerings: 0/20/205 05/6/205 Three Core IT Offerings: () CompTIA A+ Preparation Intermediate Level 0/20/205 05/6/205 Orientation 2 Hours 0/20/205 5:00 pm William Dolan Hands-on-Lab

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

CTI Short Learning Programme in IT Enigneering

CTI Short Learning Programme in IT Enigneering CTI Short Learning Programme in IT Enigneering Module Descriptions 2015 1 Short Learning Programme in IT Engineering (8 months full-time, 20 months part-time) Computer Literacy Knowing how to use a computer

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Implementing and Managing Windows 10

Implementing and Managing Windows 10 Implementing and Managing Windows 10 20697-1C; 5 Days; Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows

More information

Securing Windows Server 2016

Securing Windows Server 2016 Course 20744C: Securing Windows Server 2016 Page 1 of 7 Securing Windows Server 2016 Course 20744C: 4 days; Instructor-Led Introduction This four-day, instructor-led course teaches IT professionals how

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. Chapter Three test Name: Period: CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. 1. What protocol does IPv6 use for hardware address resolution? A. ARP

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students

More information

LO CompTIA A+ : (Exam ) Course Outline Sep 2018

LO CompTIA A+ : (Exam ) Course Outline Sep 2018 Course Outline LO CompTIA A+ : (Exam 220902) 09 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

Hands-On Hacking Course Syllabus

Hands-On Hacking Course Syllabus Hands-On Hacking Course Syllabus Version 0. 1 Hands-On Hacking 1 Table of Contents HANDS-ON HACKING... 1 TABLE OF CONTENTS... 2 COURSE SYLLABUS... 3 Course... 3 Student Pre-requisites... 3 Laptop Requirements...

More information

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs. Course Outline CompTIA Network+ N10-006 ucertify Course & Labs 06 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

CISSP - Certified Information Systems Security Professional

CISSP - Certified Information Systems Security Professional CISSP - Certified Information Systems Lab Outline The CISSP Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your

More information

COURSE B: INSTALLING AND CONFIGURING WINDOWS 10

COURSE B: INSTALLING AND CONFIGURING WINDOWS 10 ABOUT THIS COURSE This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment.

More information

CoreMax Consulting s Cyber Security Roadmap

CoreMax Consulting s Cyber Security Roadmap CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows

More information

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Objective Areas:

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Objective Areas: 2016 Course Title: IT SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Traineeship AT00005 Industry Professional Certification CompTIA and Microsoft Awards Objective Areas: Microsoft MTA;

More information

Installing and Configuring Windows 10

Installing and Configuring Windows 10 Installing and Configuring Windows 10 Course 20697-1B 5 Days Instructor-led, Hands-on Course Description This five day, instructor led course is designed to provide students with the knowledge and skills

More information

Security Solutions. Overview. Business Needs

Security Solutions. Overview. Business Needs Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.

More information

Introduction. Goal of This Book. Audience for This Book

Introduction. Goal of This Book. Audience for This Book xxvi Networking for Home and Small Businesses, CCNA Discovery Learning Guide Cisco Networking Academy is a comprehensive e-learning program that delivers information technology skills to students around

More information

Strategic Infrastructure Security

Strategic Infrastructure Security Strategic Infrastructure Security Course Number: SCPSIS Length: Certification Exam There are no exams currently associated with this course. Course Overview This course picks up right where Tactical Perimeter

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

CompTIA Network+ Lab V2.0. Course Outline. CompTIA Network+ Lab V Apr

CompTIA Network+ Lab V2.0. Course Outline. CompTIA Network+ Lab V Apr Course Outline 16 Apr 2019 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the Art Educator Tools 5. Award Winning Learning Platform

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

Securing Windows Server 2016 (20744)

Securing Windows Server 2016 (20744) Securing Windows Server 2016 (20744) Formato do curso: Presencial Localidade: Lisboa Data: 13 Mai. 2019 a 17 Mai. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Duração: 35 horas This five-day,

More information

Scope and Sequence: CCNA Exploration v4.0

Scope and Sequence: CCNA Exploration v4.0 Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Exam /Course C or B Configuring Windows Devices

Exam /Course C or B Configuring Windows Devices Exam 70-697/Course 20697-1C or 20697-2B Configuring Windows Devices Course 20697-1C Implementing and Managing Windows 10 About this course This course provides students with the knowledge and skills required

More information

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02 Semester Information Technology AS Fall 2015 Information Technology AS Proposed Network Admin & Security

More information

Training for the cyber professionals of tomorrow

Training for the cyber professionals of tomorrow Hands-On Labs Training for the cyber professionals of tomorrow CYBRScore is a demonstrated leader in professional cyber security training. Our unique training approach utilizes immersive hands-on lab environments

More information

MD-100: Modern Desktop Administrator Part 1

MD-100: Modern Desktop Administrator Part 1 Days: 5 Description: This five-day course is for IT professionals who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. Students will develop

More information

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall Agenda of today s lecture Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall Firewalls in General S-38.153 Security of Communication Protocols Antti Lehtonen 29.4.2003 firewalls

More information

"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary

Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary MOC 6435 B Designing a Windows Network Infrastructure Course Summary Description This five-day course will provide students with an understanding of how to design a Windows Network Infrastructure that

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

GCIH. GIAC Certified Incident Handler.

GCIH. GIAC Certified Incident Handler. GIAC GCIH GIAC Certified Incident Handler TYPE: DEMO http://www.examskey.com/gcih.html Examskey GIAC GCIH exam demo product is here for you to test the quality of the product. This GIAC GCIH demo also

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

10982 Supporting and Troubleshooting Windows 10

10982 Supporting and Troubleshooting Windows 10 10982 Supporting and Troubleshooting Windows 10 This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server

More information

CHCSS. Certified Hands-on Cyber Security Specialist (510)

CHCSS. Certified Hands-on Cyber Security Specialist (510) CHCSS Certified Hands-on Cyber Security Specialist () SYLLABUS 2018 Certified Hands-on Cyber Security Specialist () 2 Course Description Entry level cyber security course intended for an audience looking

More information

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs)

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs) Course Outline CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs) 17 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

CompTIA Security+ (Exam SY0-401)

CompTIA Security+ (Exam SY0-401) CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the

More information

Mobility Windows 10 Bootcamp

Mobility Windows 10 Bootcamp Mobility Windows 10 Bootcamp Length: 8 days Format: Bootcamp Time: Day About This Course This boot camp is designed to provide students with the knowledge and skills required to install and configure Windows

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Network Security Protection Alternatives for the Cloud

Network Security Protection Alternatives for the Cloud A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances

More information